How to Solve Alert Fatigue in Your SOC without Extra Staff or Effort
12
Aug
2025

How to Solve Alert Fatigue in Your SOC without Extra Staff or Effort

Imagine your Security Operations Center (SOC) as the tactical center of a medieval fortress, where vigilant sentries scan the horizon…

ShinyHunters Claims BreachForums Seized by Law Enforcement, Now a Honeypot
12
Aug
2025

ShinyHunters Claims BreachForums Seized by Law Enforcement, Now a Honeypot

The threat actor known as ShinyHunters has publicly disclosed what they claim is a covert seizure of BreachForums, a notorious…

Steelmaker Nucor discloses cyberattack on IT network
12
Aug
2025

Financial impact from severe OT events could top $300 billion

The global financial impact from catastrophic cyber events that disrupt operational technology could near $330 billion on an annual basis,…

Citrix
12
Aug
2025

Over 3,000 NetScaler devices left unpatched against CitrixBleed 2 bug

Over 3,300 Citrix NetScaler devices remain unpatched against a critical vulnerability that allows attackers to bypass authentication by hijacking user…

Critical Zoom Clients for Windows Vulnerability Lets Attackers Escalate Privileges
12
Aug
2025

Critical Zoom Clients for Windows Vulnerability Lets Attackers Escalate Privileges

Zoom has disclosed a critical vulnerability affecting multiple Windows-based clients, potentially allowing attackers to escalate privileges and compromise user systems….

Fortinet SSL VPN Targeted by Hackers from 780 Unique IP Addresses
12
Aug
2025

Fortinet SSL VPN Targeted by Hackers from 780 Unique IP Addresses

Cybersecurity researchers at GreyNoise have detected an alarming surge in brute-force attacks against Fortinet SSL VPN systems, with over 780…

Russian-Linked Curly COMrades Deploy MucorAgent Malware in Europe
12
Aug
2025

Russian-Linked Curly COMrades Deploy MucorAgent Malware in Europe

A new report from Bitdefender reveals the Russian-linked hacking group Curly COMrades is targeting Eastern Europe with a new backdoor…

A letter from HMRC is laid flat on a table with English pound coins scattered across.
12
Aug
2025

Scam hunter scammed by tax office impersonators

The next time you shake your head at another online scam and vow that you’d never fall for it, remember…

Critical vulnerability in Citrix Netscaler raises specter of exploitation wave
12
Aug
2025

Cisco NetScaler flaws lead to critical infrastructure breaches

Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Hackers have…

Russian hackers attack Western military mission using malicious drive
12
Aug
2025

Curly COMrades cyberspies hit govt orgs with custom malware

A new cyber-espionage threat group has been using a new backdoor malware that provides persistent access through a seemingly inactive scheduled…

Ivanti Connect Secure, Policy Secure and ZTA Vulnerabilities Let Attackers Trigger DoS Attack
12
Aug
2025

Ivanti Connect Secure, Policy Secure and ZTA Vulnerabilities Let Attackers Trigger DoS Attack

Ivanti has released critical security updates addressing multiple high and medium-severity vulnerabilities across its Connect Secure, Policy Secure, and Zero…

The Inevitable AI Breach? Predicting Data Theft Through Shared Vulnerabilities
12
Aug
2025

The Inevitable AI Breach? Predicting Data Theft Through Shared Vulnerabilities

Statistics shared by the World Economic Forum in 2024 show healthcare and finance to be the top two industries most targeted by…